This would be impractical unless the contractor chooses to adopt the CBA and the health insurance was provided through a union-sponsored plan. Which investigation type is required for an initial Top Secret Clearance? Interference and discrimination based on the use of sick leave are prohibited. Generally, a contractor is not required to provide pricing, profit, or sensitive customer information unless the contractor uses inability to pay, its bid proposal, or lack of competitiveness as a justification for its positions during bargaining. In order to determine our critical information, we need to consider both the friendly and adversary points of view. Overtime pay provisions (other than the Fair Labor Standards Act requirements) are not included. It is a clearance of the business entity; it has nothing to do with the physical . Only select Cognizant Security Agencies (CSAs) have hotlines for reporting industrial security issues. Select all that apply. = 45/20 -Former employees -efforts to obtain -all answers The chief statutory sources of liability to an MPP pension fund beyond the contributions required under the CBA are: (1) the withdrawal liability rules in Title IV of ERISA; (2) the Pension Protection Act of 2006 (PPA); and (3) the minimum funding rules. Read the publication. b. As with race and gender data under EO 11246, VEVRAA and Section 503 require covered employers to invite pre- and post-offer applicants and employees to self-identify for status as a protected veteran or disabled individual. Which of the following BEST identifies the goal of OPSEC? 1. Any contact by cleared employees with known or suspected intelligence officers from any country. What security control measure outlines the specific export-controlled information that has been authorized for release during a foreign visit and delineates how a company will control access? Government employees temporarily stationed at a contractor facility ______ control of their work products to the contractor. Use e-Services for Business to submit a Report of Independent Contractor(s) (DE 542).. Mail or Fax. One such requirement, defined in the NISPOM, states that contractors must report certain events to the appropriate government agencies, that may have an effect on the status of the entity's or an employee's eligibility for access to classified information. To whom may eligibility decisions be appealed if the DoD CAF denies eligibility? Application shall be made on an SF Form 86 for DOE and NRC contractors. What is defined as a weakness that can be exploited by an adversary? Under the final regulations, which became effective on January 11, 2016, employers entering into new contracts (or modifying existing contracts) after January 11, 2016, must incorporate proscribed nondiscrimination language into their nondiscrimination policies, as well as have required postings on their websites and in their workplaces. Specific facts about friendly intentions, capabilities, and operations vitally needed by adversaries to plan and act effectively is called. _____ is a conversation t Less. 2W151 Volume 1: Safety and Security - Quiz 7, 2W151 Volume 1: Safety and Security - Quiz 6. To promote an environment in which federal contracts for goods or services will be performed by contractors whose work will not be interrupted by labor unrest, President Barack Obama signed into law a mandate that federal contractors inform employees of their rights under the NLRA. International visit requirements apply when information to be disclosed is classified or unclassified but related to classified contracts or otherwise subject to export controls under the International Traffic in Arms Regulations (ITAR) or Export Administration Regulations (EAR). The EO gives federal agencies the authority to require contractors to enter into PLAs for large-scale construction projects, each of which is a project with a total cost exceeding $25 million. -Gather information on personnel The E-Verify federal contractor rule only affects federal contractors who are awarded a new contract on or after the effective date of the rule, September 8, 2009, that includes the Federal Acquisition Regulation (FAR) E-Verify clause (73 FR 67704). makes OPSEC principles second nature to your employees. demonstrate the intent and capability to be a threat to our mission. It is not intended to constitute legal advice nor does it create a client-lawyer relationship between Jackson Lewis and any recipient. hbbd```b``@$G6"5 vdVc$GG1012HM``$@gx
contractors must report which of these to the insider threat program select all that apply Contractors must report the following to the insider threat program: Efforts to obtain unauthorized access to classified or proprietary information. Select all that apply. This will allow the contractor to understand the extent to which the PLA will affect the costs of the work and bid accordingly. To ensure there are enough cleared employees to meet the needs of a contractor companys classified contract workload, To provide the CEO with justification for hiring more cleared employees, To assess whether a cleared employee still requires access to classified information. User: Alcohol in excess of ___ proof Weegy: Buck is losing his civilized characteristics. Stay Safe. The E-Verify system must be used for checking the eligibility of individuals only after the employee has been offered and has accepted the job. Select all that apply. (Select all that apply.). When a bargaining impasse occurs, the employer may implement terms it proposed to the union during bargaining. Federal contractors and subcontractors with a single government contract or subcontract of at least $150,000 must follow the non-discrimination and related provisions concerning protected veterans covered under the Vietnam Era Veterans Readjustment Assistance Act (VEVRAA). The acronym EAP stands for _____? Which investigation type is required for an initial Secret clearance? During which stage of the personnel security clearance process are the thirteen guidelines used? Efforts to obtain unauthorized access to classified or proprietary information Any contact by cleared employees with known or suspected intelligence officers from any country Who administers and oversees the contractor security program? -Over the phone If the contractor agrees to provide for increased wages and benefits and its client refuses reimbursement, these additional costs must be paid by the contractor. -Keeping unauthorized backups On January 1, 2020, the rate was increased to $10.80 an hour. In the NISPOM, what location does 1-302 represent? There is no evidence that anyone had access to the material while she was out, but nobody can confirm that the materials were safe from disclosure. 20/3 What is the purpose of an annual clearance justification review? Patterns, stereotypes, and predictable actions are all types of which of the following? C.EO 13496 (Notification of Employee Rights under Federal Labor Law). This material is provided for informational purposes only. Who must submit the RFV when a foreign national needs to visit a U.S. contractor facility to discuss classified information? Efforts to compromise a cleared employee. Some MPPs have a Free Look rule, which allows new employers to join the plan for up to five years without incurring any withdrawal liability, provided: (1) the new employers contributions are less than 2% of the total employer contributions for each year in the MPP; (2) the MPP had an 8-to-1 ratio of assets to benefit payments in the year before the employer was required to make contributions; (3) the MPP provides that any credit for service before the employer joined the plan will be lost on the employers early withdrawal; (4) the new employer did not previously have a free look; and (5) the MPP is not amended to remove the Free Look provision. OPSEC is a systematic, proven process to identify, control and protect classified information about a mission, operation or activity, and, thus, denying/mitigating adversary's ability to compromise/interrupt that mission, operation or activity. No specific procedure is required and, if a grievance cannot be resolved, the employer is not required to arbitrate the grievance. Contractors must recognize that their obligations under these laws and executive orders also apply to their subcontractors. 6 2/3 The true about technology and insider threat is: Technology changes the scale of risk from insider threats. Before conducting an interview with an employee that could lead to disciplinary action, the employee is entitled to union representation during the interview upon request. Physical security measures are a combination of active or passive systems, devices, and security personnel used to protect a security interest from possible threats. In connection with this, the DCAA evaluates whether costs are allocated to coincide appropriately with each employees division of time. Evidence of tampering with your facility's classified storage container is an example of what type of security threat? Answer Information System Security Manager (ISSM) Insider Threat Program Senior Official (ITPSO) Information System Security Professional/Security Control Assessor (ISSP/SCA) Facility Security Officer (FSO) Question 20 Question This places the current contractor at a distinct disadvantage by permitting its competitors to avoid the effect of SCA Section 4c and bidding a lower price. Suppose that you randomly pick eight first-time, full-time freshmen from the survey. He knows seminars, conventions, and exhibits can be used by adversaries to target knowledgeable resources like him. 0
U.S. Government employees and contractors must report the following: Personal foreign travel; foreign contacts; speeches or books including information about involvement with the intelligence community. How many steps are there in the OPSEC process? It's impossible to cover all the possible combinations of nationalities between companies and contractors in this blog post. Who sends the NATO Request for Visit (RFV) approval to the NATO site? None. F.EO 13658 (Minimum Wage for Contractors). Inform the DSS IS Representative that all visitors to the area must wear a badge, Inform the project manager of the heightened risk and ensure the visitor has an escort. Select all that apply. WINDOWPANE is the live-streaming app for sharing your life as it happens, without filters, editing, or anything fake. Select all that apply. One way to do this is by conducting a thorough bid/no-bid analysis that meets your company's goals and is in line with your long-term strategy. Union Security: Unions often request inclusion of a provision requiring union membership (or the payment of dues and fees by nonmembers) as a condition of employment. The National Labor Relations Act (NLRA) governs the relationship between employers and the unions that represent their employees. In addition, covered contractors must self-disclose credible evidence of violations of certain criminal laws or the civil False Claims Act and significant over-payment.. Which of the following statements concerning activity tip-offs is correct? Shift its marginal cost curve upward. in writing; through the DoD System of Record, through the DoD System of Record; through e-FCL. What is the preferred method of assessing the risk to your organization? Which international standard has recently been developed to address the socially responsible behavior of firms? Because each adversary may have different intentions and capabilities, you may need to enact different scenarios for different adversaries. Similarly, instead of making contributions to a union-sponsored pension plan, the contractor can make the contributions to its companys 401k or a similar retirement plan. defines the initial requirements for the product/service. These reports are submitted to the Federal Funding Accountability Transparency Act Subaward Reporting System. During a periodic reinvestigation of a cleared individual, During the applicants initial PCL investigation, Only when the applicant is seeking Top Secret clearance eligibility. Contractors must report which of these? = 2 5/20 Although the EO and the corresponding regulations apply only to large-scale construction projects, the wording of both the EO and the implementing rules reiterate federal contracting agencies are not prohibited from requiring PLAs on projects that do not fall within the $25-million threshold. ; Order the DE 542 form from our Online Forms and Publications. Which of these may be targeted by foreign entities? The PPA creates additional contribution responsibilities for employers obligated to contribute to critical status or red zone MPPs and the minimum funding rules, which establish mandatory annual contribution requirements. c. reporting required information. contractors must report which of these select all that applywhat do yellow license plates mean in ohio? Contractors with federal contract awards of at least $5 million (entered into on or after December 12, 2008) are subject to Federal Acquisition Regulation ethics rules. -A desire to appear well-informed According to section 10.2.8, the general contractor should report any work-related accident in writing to the owner, and will be responsible for any costs the owner incurs related to the accident. The request must state the specific Contractor Health and Safety Requirement to be waived. Generally, you must withhold and deposit income taxes, social security taxes and Medicare taxes from the wages paid to an employee. (Incorrect, there were more choices). Your knowledge of which factors impact your capability to analyze your vulnerabilities? Most inside offenders display concerning behaviors before acting directly against their organization. 2019 - The South African Department of Employment & Labour Disclaimer PAIA They are indicators that tell adversaries where to focus their collection efforts, They are vulnerabilities that tell adversaries where to focus their collection efforts, They are indicators that are not part of a unit's normal conduct, They are vulnerabilities that are not part of a unit's normal conduct. The tax rate ($3.39) must be multiplied by 100 to find the total. AAPs require a number of annual workforce and personnel activity analyses, including a Workforce Analysis, Job Group Analysis, Utilization Analysis, and Placement Goals. When the host organization approves a visit request, this approval constitutes _____. As just one example, changing the design of a tile floor is much easier to do before the tile is ordered, rather than after it's installed. Security control measures are the responsibility of the Cognizant Security Agency. Which activities are recommended as part of continuous evaluation program at a cleared facility? Any contact by cleared employees with known or suspected intelligence officers from any country. Select all that apply. After returning from a recent professional conference, Franklin received a request for classified information from an uncleared person that he met at the conference. Step 2: Create new tags and tag transactions. City Of Memphis Property Tax Payment. If a contractor or subcontractor disregards its obligations under the DBA/DBRA, in addition to being on the hook for back pay that may be owed to employees, it may be subject to contract termination and debarment from awards of future contracts for up to three years. -In person. how long is chickpea pasta good for in the fridge. Here is a list of the most common construction contract documents, and what they include. A contractor facility has been awarded classified contracts that require access to information classified at the Confidential and Secret levels. Contractors Active duty military Former employees (select all 4 answers) Which of the following is a reportable behavioral indicator? Any contact by cleared employees with known or suspected intelligence officers from any country. Any form of violence Directed at an individual or group For a specific reason A member of your team openly discusses her financial difficulties and her inability to meet her financial obligations. Which of the following roles are filled by contractor employees? the contractor's record of- (1)Conforming to requirements and to standards of good workmanship; (2)Forecasting and controlling costs; (3)Adherence to schedules, including the administrative aspects of performance; (4)Reasonable and cooperative behavior and commitment to customer satisfaction; (5)Complying with the requirements Assessing a vulnerability in conjunction with the threat, and then determining the impact this would have on an operation if the vulnerability is exploited determines the level of risk. What Is Form 1099-NEC. For contracts in excess of $500,000 for supplies (other than for commercial off-the-shelf or COTS) acquired outside the U.S. or for services performed outside the U.S., the contractor must develop an appropriate compliance plan that, at a minimum, includes certain proactive steps. Select all that apply. Union Access: Because a contractor is subject to its government clients requirements applicable to visitors, consider including a clause stating that any union representative who wants to visit the employers offices or other places of employment must comply with those requirements. makes OPSEC principles second nature to your employees. = 15 ? According to the NISPOM, espionage, sabotage, terrorism, or subversive activities should be reported as a(n) ___________________. OPSEC focuses on what type of critical information? Section 503 also imposes a number of technical obligations and restrictions similar to those of the Americans with Disabilities Act. When they identify assets, they should include only classified information. An insider threat is anyone with authorized access to the information or things an organization values most, and who uses that access, either wittingly or unwittingly, to inflict harm to the organization or national security. None. Online. Which of the following is an objective of the DSS CI Directorate? Reports on changes in KMP are required only when there is a change in the president, CEO, or FSO. U. S. government employees and contractors must report which of the following? U.S. Government employees and contractors must report the following: Personal foreign travel; foreign contacts; speeches or books including information about involvement with the intelligence community. Loss, compromise, and suspected compromise of classified information are reported how? a. periodic reinvestigations To whom should you report if you are contacted by a member of the media about information you are not authorized to share? Subjects may include the issues presented by the employer or the union that have been processed through the grievance procedure, the terms of the CBA, and the type of remedy available to an aggrieved employee. c. The company is moving to a new location to meet the needs of its growing staff. Risk of civil and criminal exposure also exist under the False Claims Act if a contractor knowingly allows employees to make false charges in connection with a federal contract. Anna is her organizations Facility Security Officer. Any agreement negotiated also may apply automatically to separate contractors who are found to be joint employers. = 15 ? Many CBAs provide that the agreement applies to any subcontractor used by the contractor to perform work done by covered employees, and the contractor is responsible for the subcontractors failure to comply with the terms of the CBA. SF 312, Classified Information Nondisclosure Agreement. Employers with at least 50 employees and a single federal contract or subcontract of at least $50,000 must comply with non-discrimination and affirmative action provisions of Section 503 of the Vocational Rehabilitation Act, including the requirement to annually prepare a written AAP for each establishment with at least 50 employees. Select all that apply. A CBA may not provide for less paid sick leave than required by the EO. In writing to your IS Rep at the DSS field office. Sam is a Facility Security Officer for a cleared defense contractor. Who sponsors classified meetings in the NISP? Physical security controls for the control of, access to, and dissemination of the classified information to be presented. contractors must report which of these select all that apply -any event that may impact the status of the facility -anything that affects the proper safeguarding of classified information -any indication that classified information has been lost or compromised. [ ], u.s. government employees and contractors must report which of the following. Jack is his organizations Facility Security Officer. Schedule of Implementation. Maintain list of militarily critical technology. performing on Department contracts; and (2) Individuals assigned to the Department from another federal agency must adhere to their home agency's security reporting requirements and additional post or mission requirements. Who might be interested in non-public information that an insider can provide? User: contractors must report which of these? Added 77 days ago|11/12/2022 9:28:04 PM Which of the following roles are filled by contractor employees? Select all that apply. Contractors must report which of these? Confidentiality of the records or information is not a valid reason to withhold the requested information, but the contractor can require a non-disclosure agreement. OPSEC differs from other programs because it requires you to look at yourself through the eyes of the adversary. Weegy: Contractors must report the following to the insider threat program: Efforts to obtain unauthorized access to classified or proprietary information. Of the scenarios listed below, which ones must be reported to your IS Rep as change conditions affecting the facility's clearance? The Construction Agreement. Select all that apply. contractors must report which of these select all that apply A large scale operation has just been conducted in your area. DD Form 254, DoD Contract Security Classification Specification, Transportation, Delivery, and Relocation Solutions (TDRS), Schedule 48.